Everything there is to find on tag: cybersecurity.
Israeli NSO Group claims to be able to steal data from iCloud, Google Drive and OneDrive
The Israeli company NSO Group has told its customers that its technology can retrieve data from users of the s...
Slack reset leaked passwords from incident in 2015
A cyber attack in 2015, recently brought to the attention of Slack, has caused a reset of the passwords of a n...
PyPI removes rogue Python libraries that install backdoors on Linux
The official Python Package Index (PyPI) has removed three rogue Python libraries. Security company ReversingL...
800,000 systems still vulnerable to Bluekeep
Over 800,000 systems are still vulnerable to Bluekeep, states security company BitSight Technologies. This is ...
Phishing practices evolved: lateral phishing is latest threat
Barracuda reports on a new research in collaboration with the University of California (Berkeley and San Diego...
Companies are getting shadow IT under control more and more.
Companies are increasingly working to tackle shadow IT, according to research by Duo Security, which is part o...
Adult DevOps processes greatly increase the chances of early detection errors
Security teams in organizations with mature DevOps processes are three times more likely to find errors before...
Vulnerability allows hackers to exploit iOS technology to log into apps
Trend Micro security researchers have found that hackers can use the iOS URL Scheme to launch attacks on certa...
Atlassian close critical remote code execution error in Jira Server
Atlassian released a patch for a critical vulnerability in Jira Server. Via the vulnerability CVE-2019-11581 a...
Symantec stops takeover calls with Broadcom
Symantec has stopped the takeover talks with Broadcom. The two companies could not agree on the price, say ins...